CN112233290B - Entrance guard using method and entrance guard device based on stranger visiting - Google Patents

Entrance guard using method and entrance guard device based on stranger visiting Download PDF

Info

Publication number
CN112233290B
CN112233290B CN202011024583.3A CN202011024583A CN112233290B CN 112233290 B CN112233290 B CN 112233290B CN 202011024583 A CN202011024583 A CN 202011024583A CN 112233290 B CN112233290 B CN 112233290B
Authority
CN
China
Prior art keywords
user
access control
entrance guard
historical track
control device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011024583.3A
Other languages
Chinese (zh)
Other versions
CN112233290A (en
Inventor
叶志钢
李明栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Greenet Information Service Co Ltd
Original Assignee
Wuhan Greenet Information Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Greenet Information Service Co Ltd filed Critical Wuhan Greenet Information Service Co Ltd
Priority to CN202011024583.3A priority Critical patent/CN112233290B/en
Publication of CN112233290A publication Critical patent/CN112233290A/en
Application granted granted Critical
Publication of CN112233290B publication Critical patent/CN112233290B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the technical field of access control, in particular to an access control use method and an access control device based on stranger visiting, wherein the method comprises the following steps: after determining that the user A is going to visit, the user B issues a track fingerprint verification task aiming at the user A, wherein the track fingerprint verification task comprises the working address information of the user A; when a user A arrives at the location of a user B, the entrance guard device acquires the historical track fingerprint of the user A in the latest preset time period through the intelligent equipment of the user A; and the access control device verifies the acquired historical track fingerprint of the user A according to the working address information, and if the verification is successful, the user A is enabled to enter. The invention can utilize the portable intelligent equipment to record the motion trail and verify the visitor through the historical motion trail, the successful verification party can execute the door opening access control operation, the visitor does not need to open the door, the use is convenient, the identity verification can be carried out on the visitor, and the user experience is improved.

Description

Entrance guard using method and entrance guard device based on stranger visiting
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of entrance guard control, in particular to an entrance guard using method and an entrance guard device based on stranger visiting.
[ background of the invention ]
With the rapid development of science and technology, the construction of smart communities and smart traffic is concerned by more and more people, and the community convenience service inevitably goes up to an intelligent and scientific road. The traditional entrance guard device of the prior community adopts the traditional metal key at the entrance of the unit, the traditional metal key is carried about every time the door is out, the loss and the supplement are troublesome, and the key is easy to copy, so the safety is poor; with the development and progress of science and technology, the entrance guard of a community and a unit building can be opened by using a smart phone at present, and great convenience is brought to users.
In the conventional access control device, when a visitor comes, the visitor needs to inquire about the home of the visitor by using a method of dialing a call by pressing a key and waits for opening the door. After the visitor hears the call sound, the visitor needs to go to the gate to inquire and verify the identity of the visitor, and the gate of the unit building is opened after verification so that the visitor can enter the building. Therefore, every time a visitor needs to enter the building door for calling, the visitor needs to take down things in the hand to go to the door for identity verification and door opening, and the use is very inconvenient; especially, if the visitor calls the visitor, the visitor is doing housework and the like, the visitor may be inconvenient to leave the hand to open the door temporarily, and the door cannot be opened in time at the moment. On the other hand, if the visitor visits, the door can be opened through simple verification, if the visitor visits by strangers, such as housekeeping service personnel, whether the identity of the visitor is suspicious or not can not be completely confirmed through simple inquiry, and if the visitor enters the building through opening the door at the moment, certain potential safety hazards may exist.
In view of the above, it is an urgent problem in the art to overcome the above-mentioned drawbacks of the prior art.
[ summary of the invention ]
The technical problems to be solved by the invention are as follows:
in the traditional access control device, a visitor needs to dial and call to inquire about a home of a visited person, the visited person hears the call and then needs to go to a doorway to verify the identity of the visitor, and then the building access control is opened to enable the visitor to enter, so that inconvenience is brought to the use of the visited person, and the access control cannot be opened in time possibly; and whether the identity of the visitor is suspicious or not can not be effectively confirmed, so that certain potential safety hazards exist.
The invention achieves the above purpose by the following technical scheme:
in a first aspect, the invention provides an entrance guard using method based on stranger visiting, which comprises the following steps:
after determining that the user A is going to visit, the user B issues a track fingerprint verification task aiming at the user A in the access control device; the track fingerprint verification task comprises work address information of a user A;
when a user A arrives at the location of a user B, the access control device acquires one or more historical track fingerprints of the user A in a latest preset time period through intelligent equipment of the user A;
the access control device verifies one or more acquired historical track fingerprints of the user A according to the working address information of the user A in the track fingerprint verification task; and if the verification is successful, executing a preset result action to enable the user A to enter.
Preferably, the preset result action includes: the method comprises the steps of opening one or more of an access control of a community where the user B is located, opening an access control of a building where the user B is located, triggering an access control device ring of the user B side, triggering an intelligent device ring of the user B side and sending a message to the intelligent device of the user B side.
Preferably, the access control device obtains one or more historical track fingerprints of the user a in a recent preset time period through the intelligent device of the user a, and specifically includes:
the entrance guard device sends a request for acquiring the historical track fingerprint in the latest preset time period to the intelligent equipment of the user A after receiving the doorbell pressing operation of the user A;
and after receiving the request, the intelligent equipment of the user A sends one or more historical track fingerprints of the user A in the latest preset time period to the access control device.
Preferably, the information interaction between the access control device and the intelligent equipment of the user A is realized in a Bluetooth or 5G Internet of things protocol mode.
Preferably, the access control device verifies the acquired one or more historical track fingerprints of the user a according to the work address information of the user a in the track fingerprint verification task, and specifically includes:
the access control device sends the acquired one or more historical track fingerprints of the user A in the latest preset time period to a cloud server where the access control device is located;
the cloud server determines a track fingerprint verification task issued by the user B and correspondingly contained work address information according to the house number of the user B; the number of the user B is determined according to the doorbell pressing operation of the user A;
the cloud server verifies the correlation between the acquired one or more historical track fingerprints of the user A and the working address information of the user A according to the track fingerprint verification task;
if the relevance meets the preset requirement, the verification is successful, and the cloud server further controls the execution of the preset result action.
Preferably, when the correlation between the historical track fingerprint of the user A and the work address information of the user A is verified, whether the correlation meets a preset requirement is judged according to the frequency of the work address in the obtained historical track fingerprint of the user A;
or judging whether the relevance meets a preset requirement or not according to the number ratio of the historical track fingerprints including the working address in the acquired historical track fingerprints of the user A.
Preferably, the user a is a staff member of the relevant company and is responsible for temporarily providing the user B with the door-to-door service.
Preferably, when the user B has multiple visitors in the same time period, the user B issues multiple track fingerprint verification tasks in the access control device for multiple visiting users, and the multiple track fingerprint verification tasks correspondingly include multiple working address information;
when the historical track fingerprint of the user A is verified, the entrance guard device verifies the historical track fingerprint of the user A according to the working address information in each track fingerprint verification task; and if any verification is successful, executing a preset result action to enable the user A to enter.
Preferably, the smart device is a smart phone, a smart bracelet or a smart watch, and is used for recording and storing the track fingerprint of the user in real time.
In a second aspect, the present invention provides a door control device based on a stranger visit, including at least one processor and a memory, where the at least one processor and the memory are connected through a data bus, and the memory stores instructions executable by the at least one processor, and the instructions, after being executed by the processor, can be used to complete the door control using method based on the stranger visit according to the first aspect.
Compared with the prior art, the invention has the beneficial effects that:
in the access control using method provided by the embodiment of the invention, the intelligent equipment carried by the user can be used for recording the motion track of the user in real time, and the identity of the visiting user is effectively verified by verifying whether the historical motion track is reasonable, so that corresponding actions are executed after the verification is successful, for example, the access control is opened to enable the user A to enter; in the process, the visited user does not need to open the access control in front of himself, the use is more convenient, the identity of the visited user can be automatically authenticated, only the person passing the identity verification enters the system, the use is more intelligent, and the user experience is improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below. It is obvious that the drawings described below are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
Fig. 1 is a flowchart of an access control method based on a stranger visit according to an embodiment of the present invention;
fig. 2 is a system architecture diagram in an access control method according to an embodiment of the present invention;
FIG. 3 is a flowchart of an embodiment of a method for implementing step 202 in FIG. 1;
FIG. 4 is a flowchart illustrating an embodiment of a method for implementing step 203 of FIG. 1;
fig. 5 is an architecture diagram of an access control device based on a visit by a stranger according to an embodiment of the present invention.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the description of the present invention, the terms "inside", "outside", "longitudinal", "lateral", "upper", "lower", "top", "bottom", "left", "right", "front", "rear", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of describing the present invention but do not require that the present invention must be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention.
In the embodiments of the present invention, the symbol "/" indicates the meaning of having both functions, and the symbol "a and/or B" indicates that the combination between the preceding and following objects connected by the symbol includes three cases of "a", "B", "a and B".
In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other. The invention will be described in detail below with reference to the figures and examples.
Example 1:
the embodiment of the invention provides an entrance guard using method based on stranger visiting, which can record the motion track of a user according to an intelligent device carried by the user, and further open an entrance guard by verifying the historical motion track of the user. The smart device can be a smart phone, a smart bracelet or a smart watch and the like which are frequently carried by a user, and the smart device is a smart phone generally because the smart phone is most commonly used.
Suppose that user a is a visitor, user B is a visited person, and user a is a stranger visiting user B. In the application scenario of the embodiment of the present invention, the user a is usually a worker of a related company and is responsible for temporarily providing a door-to-door service for the user B, and since the user a usually visits temporarily, the starting location is not fixed, but the working address of the user a can be determined according to the company to which the user a belongs, and no matter where the starting location is, the historical track fingerprint of the user a should have a higher association with the working address thereof, so that the visitor user a can be authenticated accordingly. As shown in fig. 1, the access control method provided by the embodiment of the invention specifically includes the following steps:
step 201, after a user B determines that a user A wants to visit, a track fingerprint verification task aiming at the user A is issued in an access control device; and the track fingerprint verification task comprises the working address information of the user A.
In the application scenario corresponding to the embodiment of the present invention, the user a generally refers to a staff of a related company, and temporarily provides the user B with the home service. For example, the user a may be an employee of a certain administrative company, and the user a is visiting to provide services such as cleaning for the user B; the user A can be a return visitor of a certain company and is responsible for visiting the user B for the return visit of related services; the user A can also be a worker of a decoration company, and the user A can provide decoration or installation service for the user B through going to the door; and so on. In this scenario, when the user a visits the user B, the user a does not necessarily start from the company, may start from his own home, or may start from other users' homes, so there are many possibilities for starting locations, but the company where the user a is located is determined, that is, the work address information is determined. In view of this, after determining that the user a of a certain company performs the corresponding home service, the user B may directly determine the work address information of the company of the user a in combination with the company of the user a, and then issue a track fingerprint verification task for the user a through the cloud server of the access control device according to the work address information of the company of the user a.
Step 202, when the user a arrives at the location of the user B, the access control device obtains one or more historical track fingerprints of the user a within a recent preset time period through the intelligent device of the user a.
Here, the access control device may be an access control switch responsible for a cell where the user B is located and a building where the user B is located layer by layer, or may be an access control switch responsible for only the building where the user B is located, which is not limited herein. Because the intelligent device of the user A has a GPS positioning function and can record the position and the motion trail of the user A at any time, a plurality of historical trail fingerprints of the user A are usually stored in the intelligent device, the information such as the most frequent place and the most frequent route of the user A is recorded in the historical trail fingerprints, and when the intelligent device of the user A reaches the place of the user B, the information interaction between the intelligent device of the user A and the entrance guard device can be realized in the modes such as Bluetooth or 5G internet of things protocol.
If the smart device stores all historical track fingerprints of the user since history, a large amount of memory may be occupied, and even the speed of the smart device may be affected. In order to save the occupied memory of the intelligent equipment and effectively store the representative historical track fingerprints of the user, the intelligent equipment can only store one or more historical track fingerprints of the user within the latest preset time period; the preset time period can be set according to parameters such as the maximum used memory of the intelligent device, the memory allocation condition and the running speed. For example, the smart device may only store the historical track fingerprints of the user within the last 5-10 days, which may not only avoid the memory occupation from being too large, but also obtain the recent motion track of the user, and the historical track fingerprints within the last 5-10 days have great representativeness to the knowledge of the user track. Correspondingly, the access control device only needs to acquire the historical track fingerprint of the user A in the latest preset time period for verification.
Step 203, the access control device verifies one or more acquired historical track fingerprints of the user A according to the work address information of the user A in the track fingerprint verification task; and if the verification is successful, executing a preset result action to enable the user A to enter.
Wherein the preset result action comprises: the method comprises the steps of opening one or more of an access control of a community where the user B is located, opening an access control of a building where the user B is located, triggering an access control device ring of the user B side, triggering an intelligent device ring of the user B side and sending a message to the intelligent device of the user B side. Taking the case that the access control device is mainly responsible for an access control switch of a building where the user B is located, and the preset result action is to open the access control of the building where the user B is located as an example, when verification is performed, firstly, a track fingerprint verification task of the user A issued by the user B is confirmed according to the building and a house number of the user B, and then, the work address information of the user A is also confirmed; and then verifying the relevance between the acquired historical track fingerprint and the work address information of the user A, wherein if the identity of the user A is true, the historical track of the user A has high relevance to the work address, namely the user A has arrived at the work address for many times in history. Therefore, if the relevance is high, the historical track fingerprint of the user A is verified successfully, the user A is considered to be authorized to enter the building, and the cloud server can further control the building entrance guard to be opened, so that the user A enters the building. Correspondingly, if the relevance is low, the verification fails, the user A is considered to have no right to enter the building, the entrance guard cannot be opened, and the user A cannot enter the building.
In the access control using method provided by the embodiment of the invention, the intelligent device carried by the user can be used for recording the motion track of the user in real time, and the identity of the visiting user is effectively verified by verifying whether the historical motion track is reasonable, so that corresponding actions are executed after the verification is successful, for example, a corresponding access control is opened to enable the visiting user to enter; in the process, the visited user does not need to open the access control in front of himself, the use is more convenient, the identity of the visited user can be automatically authenticated, only the person passing the identity verification enters the system, the use is more intelligent, and the user experience is improved.
Referring to fig. 2, the access control device is in wireless communication with the cloud server, and the access control device performs track fingerprint verification, identity judgment of the user a and the like through the corresponding cloud server; the intelligent device of the user A and the entrance guard device can perform information interaction in a wireless mode, so that the cloud server can obtain the track fingerprint of the user A; the intelligent equipment of the user B is bound with the access control device in advance, and therefore information interaction between the intelligent equipment of the user B and the cloud server can be achieved. For example, when the user B issues a track fingerprint verification task, the user B can directly complete the track fingerprint verification task through the bound smart device, and the track fingerprint verification method is more convenient to use.
With further reference to fig. 3, in practical applications, the access control device obtains one or more historical track fingerprints of the user a within a recent preset time period through the intelligent device of the user a, that is, step 202, specifically, the access control device may further include the following steps:
step 2021, after receiving the doorbell pressing operation of the user a, the access control device sends a request for obtaining the historical track fingerprint within the latest preset time period to the intelligent device of the user a.
Taking the access control device mainly responsible for the access control switch of the building where the user B is located as an example, when the user A arrives at the building where the user B is located, the corresponding doorbell pressing operation can be carried out according to the house number information provided by the user B; after receiving the doorbell pressing operation of the user A, the access control device further sends a historical track fingerprint request to one or more intelligent devices (including the intelligent device of the user A) in a preset range around the building door in a Bluetooth or 5G Internet of things protocol mode and the like; the user A is within a preset range around the building door, so that the user A can receive a historical track fingerprint request from the entrance guard device. For example, the preset range may be set to 2m, that is, the smart devices within 2m from the building door may all receive the corresponding request, and the user a presses the doorbell to be sure within 2m from the building door, so that the smart device may receive the track fingerprint request from the door lock device.
Step 2022, after receiving the request, the smart device of the user a sends one or more historical track fingerprints of the user a in the latest preset time period to the access control device.
Correspondingly, after receiving the request, the intelligent device of the user A can send the historical track fingerprint of the user A in the latest preset time period to the access control device in a Bluetooth mode or a 5G Internet of things protocol mode and the like. It should be noted that if there are other smart devices within the preset range around and receiving the same request, the request can be directly ignored without responding because the corresponding other users do not need to verify that the access control is passed. In an alternative scheme, if all the historical track fingerprints of the user are stored in the intelligent device, and one side of the access control device only needs to acquire the historical track fingerprint in the latest preset time period for quick verification, the intelligent device of the user a can intercept the corresponding historical track fingerprint in the latest preset time period from all the historical track fingerprints after receiving the request, and then send the historical track fingerprint to the access control device.
Referring to fig. 4 further, in practical application, the access control device verifies one or more acquired historical track fingerprints of the user a according to the work address information of the user a in the track fingerprint verification task, that is, step 203, which may specifically include the following steps:
step 2031, the access control device sends the acquired one or more historical track fingerprints of the user a in the latest preset time period to a cloud server where the access control device is located.
Step 2032, the cloud server determines the track fingerprint verification task issued by the user B and the corresponding work address information according to the house number of the user B.
The number of the user B is determined according to the doorbell pressing operation of the user A; specifically, in step 2021, when the user a arrives at the building where the user B is located, the corresponding doorbell pressing operation is performed according to the house number provided by the user B, and after the door access device receives the doorbell pressing operation of the user a, the cloud server may determine, according to the corresponding house number, the track fingerprint verification task that the user B issued before, and further determine the work address information of the user a.
Step 2033, the cloud server verifies the correlation between the acquired one or more historical track fingerprints of the user a and the work address information of the user a according to the track fingerprint verification task.
If the relevance meets the preset requirement, the verification is successful, and the cloud server further controls the execution of the preset result action. Assuming that the preset result action is specifically as follows: opening an entrance guard of a building where the user B is located, and sending a message to intelligent equipment on the side of the user B; and if the correlation between the acquired historical track fingerprint of the user A and the working address information of the user A meets the preset requirement, the verification is successful, the user A is considered to be a worker of a corresponding company really, the user A is authorized to enter the building, the cloud server further controls the entrance guard to be opened to enable the user A to enter the building, and a corresponding notification message (the user A enters) is sent to the intelligent device of the user B, so that the user B knows that the user A arrives and enters the building. Correspondingly, if the obtained correlation between the historical track fingerprint of the user A and the working address information of the user A does not meet the preset requirement, the verification fails, the user A is considered to be possibly not a worker of a corresponding company, and the identity of the user A is suspicious, so that the user A has no right to enter a building, the cloud server cannot control the access control device to open the door, and can also send a corresponding alarm message to the intelligent equipment of the user B, and the user B can know that the identity of the user A is suspicious.
Further, when the correlation between the historical track fingerprint of the user A and the work address information of the user A is verified, whether the correlation meets a preset requirement or not can be judged according to the frequency of occurrence of the work address in the obtained historical track fingerprint of the user A; or judging whether the relevance meets a preset requirement or not according to the number ratio of the historical track fingerprints including the working address in the acquired historical track fingerprints of the user A. For example, in all the acquired historical track fingerprints of the user a within the latest preset time period, if the total number of times of occurrence of the work address exceeds n times, it can be considered that the historical track fingerprint of the user a has higher relevance with the work address thereof, and the user a should be a company employee of the corresponding work address, that is, the relevance meets the preset requirement, and the verification is successful; wherein, n can be flexibly selected according to actual needs, such as 3-8 times. For another example, in all the acquired historical track fingerprints of the user a in the latest preset time period, if the number ratio of the historical track fingerprints including the work address exceeds m, it can be considered that the historical track fingerprint of the user a has a high correlation with the work address thereof, and the user a is a company employee of the corresponding work address, that is, the correlation meets the preset requirement, and the verification is successful; wherein, m can be flexibly selected according to actual needs, such as 30-80 percent.
In practical application, the user B may also have multiple visitors in the same time period, for example, there are not only housekeeping service staff but also installation service staff, and the user B may issue multiple track fingerprint verification tasks for multiple visiting users in the access control device; when the user B issues a plurality of track fingerprint verification tasks, a plurality of pieces of work address information are correspondingly contained. When the historical track fingerprint of the user A is verified, the entrance guard device can verify the historical track fingerprint of the user A according to the working address information in each track fingerprint verification task respectively, namely, the relevance between the historical track fingerprint of the user A and each piece of working address information is verified; if any verification is successful, the track fingerprint of the user A is considered to be successful, the user A is authorized to enter the building, the cloud server further controls and executes the preset result action, and the building entrance guard is opened to enable the user A to enter.
In real life, there may also be the following scenarios: the user a originally wants to visit the user C (with the number of the house number of 201), but does not respond after pressing the doorbell of the user C, and at this time, in order to smoothly enter the building, the user a may press the doorbell of another user, for example, the doorbell of the user B (with the number of the house number of 202), so that the access control device or the intelligent device on the side of the user B rings, and thus, the user B is disturbed to some extent. In order to avoid the above phenomenon, the preset result action may specifically be: and triggering the ringing of the access control device at the user B side or triggering the ringing of the intelligent equipment at the user B side, and opening the access control of the building where the user B is located. Therefore, when the user a arrives at the terminal and presses the doorbell, the access control device or the intelligent device on the user B side does not ring immediately, but in step 203, when the historical track fingerprint of the user a is successfully verified, the access control device or the intelligent device on the user B side rings, and the cloud server controls the building access control to be opened, so that the user a enters the building; and if the track fingerprint verification of the user A fails, the user A is not a visitor of the user B and belongs to a harassment situation, at the moment, the access control device or the intelligent equipment on the side of the user B cannot ring, and the cloud server cannot control the building access control to be opened, so that the interference to the user B can be avoided.
Example 2:
on the basis of the access control method based on stranger visiting provided by the embodiment 1, the invention also provides an access control device based on stranger visiting, which can be used for realizing the method, and as shown in fig. 5, the access control device is a schematic device architecture diagram of the embodiment of the invention. The access control device based on the visit of a stranger of the embodiment comprises one or more processors 21 and a memory 22. In fig. 5, one processor 21 is taken as an example.
The processor 21 and the memory 22 may be connected by a bus or other means, and fig. 5 illustrates the connection by a bus as an example.
The memory 22, as a non-volatile computer-readable storage medium based on the access control method when a stranger visits, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as the access control method based on the stranger visits in embodiment 1. The processor 21 executes various functional applications and data processing of the access control device based on stranger visit by operating the nonvolatile software programs, instructions and modules stored in the memory 22, that is, the access control using method based on stranger visit of embodiment 1 is realized.
The memory 22 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 22 may optionally include memory located remotely from the processor 21, and these remote memories may be connected to the processor 21 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The program instructions/modules are stored in the memory 22, and when executed by the one or more processors 21, perform the method for using an access control system based on a stranger visit in embodiment 1, for example, perform the steps shown in fig. 1, 3 and 4 described above.
Those of ordinary skill in the art will appreciate that all or part of the steps of the various methods of the embodiments may be implemented by associated hardware as instructed by a program, which may be stored on a computer-readable storage medium, which may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or the like.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (8)

1. A door control use method based on stranger visit is characterized by comprising the following steps:
after determining that the user A wants to visit, the user B issues a track fingerprint verification task aiming at the user A in the access control device; the track fingerprint verification task comprises the working address information of a user A;
when a user A arrives at the location of a user B, the access control device acquires one or more historical track fingerprints of the user A in a latest preset time period through intelligent equipment of the user A;
the access control device verifies one or more acquired historical track fingerprints of the user A according to the working address information of the user A in the track fingerprint verification task; if the verification is successful, executing a preset result action to enable the user A to enter;
the access control device verifies one or more acquired historical track fingerprints of the user A according to the work address information of the user A in the track fingerprint verification task, and the method specifically comprises the following steps:
the access control device sends the acquired one or more historical track fingerprints of the user A in the latest preset time period to a cloud server where the access control device is located;
the cloud server determines a track fingerprint verification task issued by the user B and correspondingly contained work address information according to the house number of the user B; the number of the user B is determined according to the doorbell pressing operation of the user A;
the cloud server verifies the correlation between the acquired one or more historical track fingerprints of the user A and the working address information of the user A according to the track fingerprint verification task;
if the relevance meets a preset requirement, the verification is successful, and the cloud server further controls to execute a preset result action;
when the correlation between the historical track fingerprint of the user A and the work address information of the user A is verified, judging whether the correlation meets a preset requirement or not according to the frequency of occurrence of the work address in the obtained historical track fingerprint of the user A;
or judging whether the relevance meets a preset requirement or not according to the number ratio of the historical track fingerprints including the working address in the acquired historical track fingerprints of the user A.
2. The method of claim 1, wherein the predetermined result action comprises: the method comprises the steps of opening one or more of an access control of a community where the user B is located, opening an access control of a building where the user B is located, triggering an access control device ring of the user B side, triggering an intelligent device ring of the user B side and sending a message to the intelligent device of the user B side.
3. The entrance guard using method based on stranger visiting of claim 1, wherein the entrance guard device obtains one or more historical track fingerprints of the user a within a recent preset time period through an intelligent device of the user a, and specifically comprises:
the entrance guard device sends a request for acquiring the historical track fingerprint in the latest preset time period to the intelligent equipment of the user A after receiving the doorbell pressing operation of the user A;
and after receiving the request, the intelligent equipment of the user A sends one or more historical track fingerprints of the user A in the latest preset time period to the access control device.
4. The entrance guard using method based on stranger visiting of claim 1, wherein the entrance guard device and the intelligent device of user A realize information interaction through Bluetooth or 5G Internet of things protocol.
5. The method as claimed in any one of claims 1 to 4, wherein the user A is a staff member of a related company and is responsible for temporarily providing the user B with a service of visiting the door.
6. The entrance guard use method based on stranger visit according to any one of claims 1-4, characterized in that, when user B has multiple visitors in the same time period, user B issues multiple track fingerprint verification tasks in the entrance guard device for multiple visiting users, and the tasks correspondingly contain multiple working address information;
when the historical track fingerprint of the user A is verified, the entrance guard device verifies the historical track fingerprint of the user A according to the working address information in each track fingerprint verification task; and if any verification is successful, executing a preset result action to enable the user A to enter.
7. The entrance guard using method based on stranger visiting as claimed in any one of claims 1-4, wherein the smart device is a smart phone, a smart band or a smart watch, and is used for recording and storing the trace fingerprint of the user in real time.
8. An entrance guard device based on stranger visit, which comprises at least one processor and a memory, wherein the at least one processor and the memory are connected through a data bus, and the memory stores instructions executable by the at least one processor, and the instructions are used for completing the entrance guard using method based on stranger visit according to any one of claims 1-7 after being executed by the processor.
CN202011024583.3A 2020-09-25 2020-09-25 Entrance guard using method and entrance guard device based on stranger visiting Active CN112233290B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011024583.3A CN112233290B (en) 2020-09-25 2020-09-25 Entrance guard using method and entrance guard device based on stranger visiting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011024583.3A CN112233290B (en) 2020-09-25 2020-09-25 Entrance guard using method and entrance guard device based on stranger visiting

Publications (2)

Publication Number Publication Date
CN112233290A CN112233290A (en) 2021-01-15
CN112233290B true CN112233290B (en) 2022-06-21

Family

ID=74107777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011024583.3A Active CN112233290B (en) 2020-09-25 2020-09-25 Entrance guard using method and entrance guard device based on stranger visiting

Country Status (1)

Country Link
CN (1) CN112233290B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009276112A (en) * 2008-05-13 2009-11-26 Nissan Motor Co Ltd Destination presumption device and destination presumption method
CN105632000A (en) * 2016-03-07 2016-06-01 上海斐讯数据通信技术有限公司 Door lock control method and system based on mobile terminal
CN108871350A (en) * 2017-05-11 2018-11-23 北京嘀嘀无限科技发展有限公司 A kind of display methods, display system and the computer installation of digital map navigation mode
CN111599060A (en) * 2020-05-22 2020-08-28 日立楼宇技术(广州)有限公司 Online service management method, device and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110766849A (en) * 2019-10-24 2020-02-07 武汉菲旺软件技术有限责任公司 Method, device, equipment and medium for automatically identifying foreign personnel by community access control

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009276112A (en) * 2008-05-13 2009-11-26 Nissan Motor Co Ltd Destination presumption device and destination presumption method
CN105632000A (en) * 2016-03-07 2016-06-01 上海斐讯数据通信技术有限公司 Door lock control method and system based on mobile terminal
CN108871350A (en) * 2017-05-11 2018-11-23 北京嘀嘀无限科技发展有限公司 A kind of display methods, display system and the computer installation of digital map navigation mode
CN111599060A (en) * 2020-05-22 2020-08-28 日立楼宇技术(广州)有限公司 Online service management method, device and system

Also Published As

Publication number Publication date
CN112233290A (en) 2021-01-15

Similar Documents

Publication Publication Date Title
US10810817B2 (en) Remote guest access to a secured premises
CN101393622B (en) A method and a system for presenting reminders in a portable device
US7313383B2 (en) System for regulating entrance/exit of person and communication of wireless communication terminal, entrance/exit regulating apparatus to be used for the system, and wireless communication apparatus whose communication is to be restricted
CN109523678A (en) The exchange method and device of intelligent entrance guard
CN103679906A (en) Wireless network based access control system
CN105227440A (en) Terminal data share system, method and input equipment, drive recorder terminal
CN108174142A (en) A kind of long-range control locking method locked based on intelligent doorbell and intelligent cloud, system
CN105915723B (en) Building intercom method, system and entrance machine
CN105141798A (en) Unit building door management method and unit building door system
CN205693743U (en) A kind of building conversational system
CN112927408A (en) Visitor visiting processing method and device
CN112911207A (en) Calling method and intelligent talkback system
CN111784901A (en) Cloud access control system based on cloud computing and mobile internet and implementation method
CN110910541A (en) Access control method, system, network device and computer readable storage medium
JP6496863B1 (en) Server and reception screen display method
CN106355706A (en) Intelligent door lock system
CN112233290B (en) Entrance guard using method and entrance guard device based on stranger visiting
CN107301496B (en) Anti-occupation system and anti-occupation method for shared bicycle
CN111047761A (en) Voice interactive visitor identity recognition method and system based on intelligent terminal
CN112233292B (en) Door control using method and door control device based on acquaintance visiting
CN112233291A (en) Entrance guard using method and entrance guard device based on intelligent device track
JP4344303B2 (en) Entrance / exit management system
CN111768544B (en) Intelligent access control method, device and system, electronic equipment and storage medium
CN105989699A (en) Terminal information processing method, terminal, and system
CN114399864A (en) Intelligent access control method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant